Sciweavers

6530 search results - page 1148 / 1306
» Application Integration
Sort
View
128
Voted
PVLDB
2008
81views more  PVLDB 2008»
15 years 3 months ago
Optimization of multi-domain queries on the web
Where can I attend an interesting database workshop close to a sunny beach? Who are the strongest experts on service computing based upon their recent publication record and accep...
Daniele Braga, Stefano Ceri, Florian Daniel, David...
148
Voted
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 7 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
CHI
2006
ACM
16 years 4 months ago
Interacting with communication appliances: an evaluation of two computer vision-based selection techniques
Communication appliances, intended for home settings, require intuitive forms of interaction. Computer vision offers a potential solution, but is not yet sufficiently accurate.As ...
Jacob Eisenstein, Wendy E. Mackay
156
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
Patterns, Frameworks, and Middleware: Their Synergistic Relationships
The knowledge required to develop complex software has historically existed in programming folklore, the heads of experienced developers, or buried deep in the code. These locatio...
Douglas C. Schmidt, Frank Buschmann
150
Voted
AINA
2004
IEEE
15 years 7 months ago
An Efficient Clustered Architecture for P2P Networks
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Juan Li, Son T. Vuong
« Prev « First page 1148 / 1306 Last » Next »